Job Applicants' Information Privacy-Protective Response: Exploring the Roles of Technology Readiness and Trust
暂无分享,去创建一个
[1] Edward E. Rigdon,et al. Advanced Structural Equation Modeling: Issues and Techniques , 1998 .
[2] David Gefen,et al. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..
[3] Michael Siegrist,et al. New Information and Social Trust: Asymmetry and Perseverance of Attributions about Hazard Managers , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[4] Miriam J. Metzger. Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..
[5] Kyesook Han,et al. Beyond the technology adoption: Technology readiness effects on post-adoption behavior , 2011 .
[6] Kuanchin Chen,et al. Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..
[7] Elin Palm,et al. Securing privacy at work: the importance of contextualized consent , 2009, Ethics and Information Technology.
[8] G L Little,et al. One-Day Dropouts from Correctional Drug Treatment , 1982, Psychological reports.
[9] Peter A. Rosen,et al. Social Networking Websites, Personality Ratings, and the Organizational Context: More Than Meets the Eye?1 , 2012 .
[10] A. Parasuraman,et al. The impact of technology on the quality-value-loyalty chain: A research agenda , 2000 .
[11] Donald T. Campbell,et al. Testing a Single-Factor Model as an Alternative to the Misuse of Partial Correlations in Hypothesis-Testing Research , 1970 .
[12] Jennifer S. Tucker,et al. Selection in the Information Age: The Impact of Privacy Concerns and Computer Experience on Applicant Reactions , 2006 .
[13] Charles N. Greene,et al. An Evaluation of Causal Models Linking the Received Role with Job Satisfaction. , 1973 .
[14] Roderick M. Kramer,et al. Trust and distrust in organizations: emerging perspectives, enduring questions. , 1999, Annual review of psychology.
[15] Xun William Xu,et al. Using behavioral modeling technology to capture designer's intent , 2005, Comput. Hum. Behav..
[16] Rex B. Kline,et al. Principles and Practice of Structural Equation Modeling , 1998 .
[17] Andrea Everard,et al. Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..
[18] Sung S. Kim,et al. Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..
[19] Lixuan Zhang,et al. Antecedents and consequences of trust in a social media brand: A cross-cultural study of Twitter , 2013, Comput. Hum. Behav..
[20] Detmar W. Straub,et al. An Update and Extension to SEM Guidelines for Admnistrative and Social Science Research , 2011 .
[21] Peter A. Rosen,et al. Future employment selection methods: evaluating social networking web sites , 2009 .
[22] Jeffrey T. Child,et al. Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory , 2013, Comput. Hum. Behav..
[23] A. Baier. Trust and Antitrust , 1986, Ethics.
[24] L. A. Hayes,et al. How Do Technology Readiness, Platform Functionality and Trust Influence C2c User Satisfaction? , 2012 .
[25] P. Bentler,et al. Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .
[26] Jason Bennett Thatcher,et al. The Moderating Effects of Privacy Restrictiveness and Experience on Trusting Beliefs and Habit: An Empirical Test of Intention to Continue Using a Social Networking Website , 2012, IEEE Transactions on Engineering Management.
[27] Chang-Hyun Jin,et al. The effects of individual innovativeness on users' adoption of Internet content filtering software and attitudes toward children's Internet use , 2013, Comput. Hum. Behav..
[28] J. Lewis,et al. Trust as a Social Reality , 1985 .
[29] Hae Young Lee,et al. A study of the impact of personal innovativeness on online travel shopping behavior—A case study of Korean travelers , 2007 .
[30] Zhenhui Jiang,et al. Research Note - Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions , 2013, Inf. Syst. Res..
[31] M. Featherman,et al. Social Word of Mouth: How Trust Develops in the Market , 2014 .
[32] J. Hair. Multivariate data analysis , 1972 .
[33] Rita Walczuch,et al. Psychological antecedents of institution-based consumer trust in e-retailing , 2004, Inf. Manag..
[34] Guido Möllering,et al. The Nature of Trust: From Georg Simmel to a Theory of Expectation, Interpretation and Suspension , 2001 .
[35] William P. Smith,et al. You've been tagged! (Then again, maybe not): Employers and Facebook , 2010 .
[36] Yair Amichai-Hamburger,et al. Social network use and personality , 2010, Comput. Hum. Behav..
[37] Charles J. Kacmar,et al. The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..
[38] Rino Falcone,et al. Trust Theory: A Socio-Cognitive and Computational Model , 2010 .
[39] Jiun-Sheng Chris Lin,et al. The influence of technology readiness on satisfaction and behavioral intentions toward self-service technologies , 2007, Comput. Hum. Behav..
[40] I. Ajzen. The theory of planned behavior , 1991 .
[41] Robert G. Capra,et al. Factors mediating disclosure in social network sites , 2011, Comput. Hum. Behav..
[42] H. Raghav Rao,et al. Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing , 2013, Decis. Support Syst..
[43] Sandra Streukens,et al. The effect of service employees' technology readiness on technology acceptance , 2007, Inf. Manag..
[44] Michael S. Cole,et al. Recruiters’ Inferences of Applicant Personality Based on Resume Screening: Do Paper People have a Personality? , 2009 .
[45] R. Kramer,et al. Trust in Organizations: Frontiers of Theory and Research , 1995 .
[46] Leigh Anne Clark,et al. Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice , 2010 .
[47] H. Harman. Modern factor analysis , 1961 .
[48] Craig Ross,et al. Personality and motivations associated with Facebook use , 2009, Comput. Hum. Behav..
[49] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[50] Ana Paula Rocha,et al. A Socio-cognitive Perspective of Trust , 2013 .
[51] R. Lennox,et al. Conventional wisdom on measurement: A structural equation perspective. , 1991 .
[52] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[53] C. Castelfranchi,et al. Social Trust : A Cognitive Approach , 2000 .
[54] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[55] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[56] N. L. Chervany,et al. Initial Trust Formation in New Organizational Relationships , 1998 .
[57] Yichuan Wang,et al. Co-Creation in Branding Through Social Commerce: The Role of Social Support, Relationship Quality and Privacy Concerns , 2014, AMCIS.
[58] Nadine Hennigs,et al. Determinants of Consumers' Perceived Trust in IT-Ecosystems , 2010, J. Theor. Appl. Electron. Commer. Res..
[59] Barbara M. Byrne,et al. Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .
[60] Robert L. Dipboye,et al. Interviewer Experience and Expertise Effects , 1999 .
[61] Ralf Caers,et al. LinkedIn and Facebook in Belgium , 2010 .
[62] Marshall Scott Poole,et al. Interpersonal Traits, Complementarity, and Trust in Virtual Collaboration , 2004, J. Manag. Inf. Syst..